新的黑洞攻击下DSR协议的评估

M. Salehi, H. Samavati, M. Dehghan
{"title":"新的黑洞攻击下DSR协议的评估","authors":"M. Salehi, H. Samavati, M. Dehghan","doi":"10.1109/IRANIANCEE.2012.6292433","DOIUrl":null,"url":null,"abstract":"Black hole attack is a well-known attack under which performance and efficiency of mobile ad hoc networks decreases dramatically by malicious nodes. This attack affects functionality of network by dropping data packets. Black hole attack operates based upon two different phases; first, advertising fake routes containing attacker node. Second, dropping received data packets. When it comes to route advertisement phase, operation of this attack in reactive protocols can be classified into two categories. Advertising fake routes in response to route request (RREQ) packets, and advertising according to route reply (RREP) packets. In related works, Black hole attack has been evaluated and analyzed based on creating fake RREPs in response to received RREQ packets. In this paper, however, a novel more destructive attack named Deep Black hole is introduced and evaluated. This attack advertises fake RREPs more strongly than previous ones. Evaluation of network parameters has been performed related to DSR protocol in NS-2. Simulation results represent that Deep Black hole, compared to ordinary Black hole and selfish nodes, is more damaging and leads to network denial of service. This attack results in a decrease in the number of network routing packets and end-to-end delay especially compared to selfish nodes.","PeriodicalId":308726,"journal":{"name":"20th Iranian Conference on Electrical Engineering (ICEE2012)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Evaluation of DSR protocol under a new Black hole attack\",\"authors\":\"M. Salehi, H. Samavati, M. Dehghan\",\"doi\":\"10.1109/IRANIANCEE.2012.6292433\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Black hole attack is a well-known attack under which performance and efficiency of mobile ad hoc networks decreases dramatically by malicious nodes. This attack affects functionality of network by dropping data packets. Black hole attack operates based upon two different phases; first, advertising fake routes containing attacker node. Second, dropping received data packets. When it comes to route advertisement phase, operation of this attack in reactive protocols can be classified into two categories. Advertising fake routes in response to route request (RREQ) packets, and advertising according to route reply (RREP) packets. In related works, Black hole attack has been evaluated and analyzed based on creating fake RREPs in response to received RREQ packets. In this paper, however, a novel more destructive attack named Deep Black hole is introduced and evaluated. This attack advertises fake RREPs more strongly than previous ones. Evaluation of network parameters has been performed related to DSR protocol in NS-2. Simulation results represent that Deep Black hole, compared to ordinary Black hole and selfish nodes, is more damaging and leads to network denial of service. This attack results in a decrease in the number of network routing packets and end-to-end delay especially compared to selfish nodes.\",\"PeriodicalId\":308726,\"journal\":{\"name\":\"20th Iranian Conference on Electrical Engineering (ICEE2012)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"20th Iranian Conference on Electrical Engineering (ICEE2012)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRANIANCEE.2012.6292433\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"20th Iranian Conference on Electrical Engineering (ICEE2012)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRANIANCEE.2012.6292433","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

黑洞攻击是一种众所周知的攻击,在这种攻击下,恶意节点会使移动自组网的性能和效率急剧下降。这种攻击通过丢弃数据包来影响网络的功能。黑洞攻击基于两个不同的阶段;首先,发布包含攻击者节点的假路由。第二,丢弃接收到的数据包。在路由发布阶段,这种攻击在响应式协议中的操作可以分为两类。根据RREQ (route request)报文发布假路由,根据RREP (route reply)报文发布。在相关工作中,通过对接收到的RREQ报文产生假rrep,对黑洞攻击进行了评估和分析。然而,本文介绍并评估了一种新的更具破坏性的攻击——深黑洞。这次攻击比以前更强烈地宣传虚假的rrep。在NS-2中进行了与DSR协议相关的网络参数评估。仿真结果表明,与普通黑洞和自私节点相比,深黑洞具有更大的破坏性,会导致网络拒绝服务。这种攻击导致网络路由数据包数量减少,端到端延迟减少,特别是与自私节点相比。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Evaluation of DSR protocol under a new Black hole attack
Black hole attack is a well-known attack under which performance and efficiency of mobile ad hoc networks decreases dramatically by malicious nodes. This attack affects functionality of network by dropping data packets. Black hole attack operates based upon two different phases; first, advertising fake routes containing attacker node. Second, dropping received data packets. When it comes to route advertisement phase, operation of this attack in reactive protocols can be classified into two categories. Advertising fake routes in response to route request (RREQ) packets, and advertising according to route reply (RREP) packets. In related works, Black hole attack has been evaluated and analyzed based on creating fake RREPs in response to received RREQ packets. In this paper, however, a novel more destructive attack named Deep Black hole is introduced and evaluated. This attack advertises fake RREPs more strongly than previous ones. Evaluation of network parameters has been performed related to DSR protocol in NS-2. Simulation results represent that Deep Black hole, compared to ordinary Black hole and selfish nodes, is more damaging and leads to network denial of service. This attack results in a decrease in the number of network routing packets and end-to-end delay especially compared to selfish nodes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Geometrical analysis of altitude estimation error caused by pixel quantization in stereo vision Time-domain MoM for the scattering analysis of thin-wire structures within a ground using band-limited Second-Order Lagrange temporal basis functions Variable-structure position control-a class of fast and robust controllers for synchronous reluctance motor drives Analysis of corona effect on lightning performance of HV overhead transmission line using ATP/EMTP Font recognition using Variogram fractal dimension
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1